Access "Security Seven Awards"
This article is part of the October 2005 issue of Security 7 Award winners unmasked
SPECIAL Seven winners. Seven verticals. Countless achievements. Welcome to our first annual Security 7 awards, where we profile seven security practitioners who have helped shape information security technologies, policies and practices. Information Security magazine, our sister site SearchSecurity.com and Information Security Decisions, our annual conference, have created these awards to recognize the achievements of the world's top security professionals. We solicited nominations from the security industry and then had an industry panel select the winners. They represent seven different vertical industries--education, financial services, telecommunications, government, energy, manufacturing and healthcare--but have the same strong commitment to information security. From San Francisco to Wolfsburg, Germany, from the researcher who identified DDoS source code to the manager who protects the fifth largest network in the world--our Security 7 recipients are visionaries, pioneers and innovators. Each is a giant in his field with huge responsibilities and ... Access >>>
Premium Content for Free.
Security Seven Awards
Seven winners. Seven verticals. Countless achievements.
Education: Dave Dittrich
Financial Services: Christofer Hoff
Telecommunications: Edward Amoroso
Government: Charles McGann
Energy: Richard Jackson
Manufacturing: Hans-Ottmar Beckmann
Health Care: Patrick Heim
Profiles by Michael S. Mimoso, Bill Brenner, Herman Mehling, Susan Hildreth, Mark Baard
SQL Server 2005 Premieres
Next month, Microsoft adds a star-studded cast of security features to its database system.
Secure Reads: InfoSec Career Hacking
Read a review of the security book: "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul"
Antivirus: F-Secure's Anti-Virus Client Security 6.0
F-Secure's Anti-Virus Client Security 6.0
Recent Releases: Security product briefs, October 2005
Take a look at the security products released in October 2005.
- Security Seven Awards
Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
Blue Coat Systems' Spyware Interceptor SI-1
Will VoIP's shortcomings give businesses a wake-up call?
Hot Pick: Hercules 4.0 Enterprise Vulnerability Management Suite
Citadel Security Software's Hercules 4.0 Enterprise Vulnerability Management Suite
Digital Rights Management: Microsoft Windows Rights Management Services
Microsoft's Windows Rights Management Services
Finjan Software's Vital Security Appliance NG-1100
- Antispyware: Blue Coat Systems' Spyware Interceptor SI-1
On The Radar: Tools to survive the security wilderness
Perspectives: The Rise of Dataflation
Dataflation is the destabilizing tendency of data to lose value due to factors such as large-scale unauthorized access, excessive abuse and loss of confidentiality.
Editor's Desk: The need for constant vigilance
Ping: Jennifer Granick
- On The Radar: Tools to survive the security wilderness
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...